Results
|
1861.
|
|
Image from Amazon.com
|
|
|
1862.
|
|
Image from Amazon.com
|
|
|
1863.
|
|
Image from Amazon.com
|
|
|
1864.
|
|
Image from Amazon.com
|
|
|
1865.
|
|
Image from Amazon.com
|
|
|
1866.
|
|
Image from Amazon.com
|
Trust Management IX [electronic resource] : 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedings / edited by Christian Damsgaard Jensen, Stephen Marsh, Theo Dimitrakos, Yuko Murayama. by Series: IFIP Advances in Information and Communication Technology ; 454Publisher: Cham : Springer International Publishing : Imprint: Springer, 2015
In:
Springer eBooks
Availability: No items available.
|
|
1867.
|
|
Image from Amazon.com
|
|
|
1868.
|
|
Image from Amazon.com
|
Privacy and Identity Management for the Future Internet in the Age of Globalisation [electronic resource] : 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Patras, Greece, September 7-12, 2014, Revised Selected Papers / edited by Jan Camenisch, Simone Fischer-Hübner, Marit Hansen. by Series: IFIP Advances in Information and Communication Technology ; 457Publisher: Cham : Springer International Publishing : Imprint: Springer, 2015
In:
Springer eBooks
Availability: No items available.
|
|
1869.
|
|
Image from Amazon.com
|
Codes, Cryptology, and Information Security [electronic resource] : First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger / edited by Said El Hajji, Abderrahmane Nitaj, Claude Carlet, El Mamoun Souidi. by Series: Lecture Notes in Computer Science ; 9084Publisher: Cham : Springer International Publishing : Imprint: Springer, 2015
In:
Springer eBooks
Availability: No items available.
|
|
1870.
|
|
Image from Amazon.com
|
|
|
1871.
|
|
Image from Amazon.com
|
|
|
1872.
|
|
Image from Amazon.com
|
|
|
1873.
|
|
Image from Amazon.com
|
|
|
1874.
|
|
Image from Amazon.com
|
|
|
1875.
|
|
Image from Amazon.com
|
|
|
1876.
|
|
Image from Amazon.com
|
Intelligent Mechanisms for Network Configuration and Security [electronic resource] : 9th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2015, Ghent, Belgium, June 22-25, 2015. Proceedings / edited by Steven Latré, Marinos Charalambides, Jérôme François, Corinna Schmitt, Burkhard Stiller. by Series: Lecture Notes in Computer Science ; 9122Publisher: Cham : Springer International Publishing : Imprint: Springer, 2015
In:
Springer eBooks
Availability: No items available.
|
|
1877.
|
|
Image from Amazon.com
|
Detection of Intrusions and Malware, and Vulnerability Assessment [electronic resource] : 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings / edited by Magnus Almgren, Vincenzo Gulisano, Federico Maggi. by Series: Lecture Notes in Computer Science ; 9148Publisher: Cham : Springer International Publishing : Imprint: Springer, 2015
In:
Springer eBooks
Availability: No items available.
|
|
1878.
|
|
Image from Amazon.com
|
|
|
1879.
|
|
Image from Amazon.com
|
|
|
1880.
|
|
Image from Amazon.com
|
|